If you have deployed applications on Cloud Foundry, you know how easy it is to push an app, bind services to it, and scale it. There are more magical things behind the scenes. Did you know, for example, that cloudfoundry.com is updated approximately twice a week?
Look at the requirements for highly available applications in the cloud and explore architectures and common patterns you can apply to your Windows Azure solutions. You will explore the available practical techniques for high availably, geo-redundancy and disaster recovery and review specific customer examples from the field.
The recent surge in cloud computing has really changed the way architectures are evolving. Platforms as a Service (PAAS) and Software as a Service (SAAS) is becoming where organizations can get necessary resources as needed without having to worry about many hardware and software configuration issues.
To truly appreciate the simplicity of monitoring in the cloud, it helps to first separate the hype from the reality. What is the cloud? The cloud is just a collection of applications and services layered on top of the same virtualization and storage services that we’re already familiar with in …
Learn about the advantages of a message oriented architecture to be able to mash up together a polyglot system of apps and services with with Node.js and RabbitMQ.
How does one build a “modern” application? What are the key design patterns ranging from adaptive and insight-driven applications to ‘Social’-enabled & aware application design, to Big Data: why HPC is coming to you… Architecture patterns and practices ranging from Enterprise Architecture to design and delivery.
With today’s heterogeneous system/application environments, enterprise developers and architects are often faced with complex integration challenges that often result in Moloch-like code. This session introduces common enterprise application integration (EAI) patterns that can easily be used to integrate Java EE applications into heterogeneous system environments.
Cloud computing has specific security challenges as multi-tenancy and virtualization features create risks due to sharing of physical resources among potential untrusted tenant. Heterogeneity of services also requires different degrees of granularity in access control mechanisms. This article discusses a distributed architecture based on principles from security management and software …